WO2008032821A1 - Procédé de transmission/réception de données - Google Patents

Procédé de transmission/réception de données Download PDF

Info

Publication number
WO2008032821A1
WO2008032821A1 PCT/JP2007/067943 JP2007067943W WO2008032821A1 WO 2008032821 A1 WO2008032821 A1 WO 2008032821A1 JP 2007067943 W JP2007067943 W JP 2007067943W WO 2008032821 A1 WO2008032821 A1 WO 2008032821A1
Authority
WO
WIPO (PCT)
Prior art keywords
management data
data
file
management
electronic file
Prior art date
Application number
PCT/JP2007/067943
Other languages
English (en)
Japanese (ja)
Inventor
Kazutaka Hayashi
Original Assignee
Aplico System Co., Ltd.
Ekkus Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aplico System Co., Ltd., Ekkus Company Limited filed Critical Aplico System Co., Ltd.
Priority to EP07807347A priority Critical patent/EP2075750A1/fr
Priority to JP2008534407A priority patent/JPWO2008032821A1/ja
Publication of WO2008032821A1 publication Critical patent/WO2008032821A1/fr
Priority to US12/371,462 priority patent/US20090182876A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Definitions

  • the present invention delivers a valuable electronic file (or data itself recorded in it) having data in which the value of the securities is recorded or information associated with the securities is recorded. It relates to a method and system that realizes the delivery of securities.
  • a representative example is a telephone card, which is a card that records the usable frequency of a telephone as magnetic data.
  • EDY registered trademark
  • watermelon registered trademark
  • Securities having information in a bit array are classified into an online ID management type and an offline management type.
  • Online ID management works powerfully against double use of value.
  • the user is connected to the center, manages the value of securities, etc. for each user ID, and the value transferee also assigns an ID.
  • the value transferee By limiting it to those who have it, almost no unauthorized use is allowed.
  • offline-managed telephone cards are used off-line, so there is no need for management at the center S, and they are easily copied and forged.
  • the online ID management type is mainly used to prevent unauthorized use of current electromagnetic securities.
  • the payee and the balance for each payee are managed at the center. That is Line ID + balance center management type (ID balance center management type for short). Therefore, the information delivery destination must be registered in the center. This complicates the system and increases the cost of operation.
  • Non-patent literature l PeterWayner, "Digital Cash Technology", Softbank Creative, 1997, ISBN4797303603
  • the present invention solves the problem of force.
  • a nutshell while providing a balance-balanced management type, it provides value-based digitization that makes it difficult for fraud to occur.
  • the server device receives the management data transmitted from the terminal including the verification information for determining whether or not the server device is valid, and the server device includes the received management data.
  • the server device determines whether the verification information is valid. If the result of the determination is that the verification information is valid, the server device invalidates the verification information. Preparing new valid collation information, and replacing the invalidated collation information included in the management data with the prepared new valid collation information.
  • management data transmitted from the terminal including a communication interface for communicating with the terminal and verification information for determining whether the terminal is valid or invalid is received using the communication interface. And a receiver included in the received management data.
  • a determination unit that determines whether the diversion information is valid or invalid; an invalidation unit that invalidates the collation information when the collation information is determined to be valid; and a new valid collation
  • a replacement management that is management data obtained by replacing the invalidated verification information in the received management data with the prepared new valid verification information.
  • a server device comprising: a replacement unit that generates data; and a transmission unit that transmits the replacement unit-completed management data to the terminal or a terminal different from the terminal using the communication interface. Provide a data transmission / reception system.
  • a terminal such as a PC can receive an electronic file that represents value on any electromagnetic medium, no registration of the recipient is required at the center server, and it is virtually impossible to forge the electronic file. Electronicization of difficult values becomes possible.
  • the verification information is rewritten with the transfer of value or the like.
  • the conventional technology is different in that the user's ID can be transferred by transferring the user's ID itself, and the user's ID is unchanged.
  • the value can be transferred by passing an electronic file (also referred to as management data)
  • the system is simple and the operation cost is low. Also, since anyone can receive it, it is not necessary to register the store and it is easy to enter.
  • management data also referred to as management data
  • Management data since the verification information is rewritten, even if management data is skimmed, Management data must be used immediately, and a system that is easy to notice and difficult to steal can be realized.
  • 1 is a block diagram of the server.
  • FIG. 2 is a diagram showing the flow of a valuable electronic file according to the overall example.
  • FIG. 3 is a block diagram of a terminal.
  • FIG. 5 is a diagram for explaining a method for verifying the received electronic file.
  • FIG. 7 is a diagram for explaining a method of dividing the value of a valuable electronic file.
  • FIG. 9 is a diagram illustrating a method for exchanging valuable electronic files with securities.
  • FIG. 10 is a diagram for explaining a method for transferring value between valuable electronic files of the same terminal.
  • 11] is a diagram for explaining a method for transferring value between valuable electronic files between different terminals.
  • FIG. 14 is a diagram explaining a method of specifying a recipient.
  • FIG. 16 is an example of a management data issue request.
  • FIG. 18 is an example of a table associating value IDs with verification information.
  • FIG. 19 is an example of management data.
  • FIG. 20 is a sequence diagram showing a process of communication between the issue request side terminal and the server device.
  • FIG. 21 is a functional block diagram of a server device according to an embodiment of the present invention.
  • FIG. 22 is a flowchart of processing in the server apparatus according to one embodiment of the present invention.
  • FIG. 23 is a functional block diagram of a server apparatus according to an embodiment of the present invention.
  • FIG. 24 is an example of a table associating value IDs with verification information.
  • FIG. 25 is an example of a table associating value IDs with verification information.
  • FIG. 26 is an example of management data in which the verification information is replaced.
  • FIG. 27 is an example of a table associating value ID and validity information with verification information.
  • FIG. 28 is an example of a table associating value ID and validity information with verification information.
  • FIG. 29 is an example of a table associating value ID and validity information with verification information.
  • FIG. 30 is a sequence diagram showing a flow of management data among the assigning terminal, the server, and the assigning terminal.
  • each device is a computer with a configuration in which a CPU (central processing unit), memory, secondary storage device, input / output device, communication interface, etc. are connected to each other via a bus.
  • This is realized by loading a program. That is, the total using a so-called program It can be realized with a computer system.
  • the use of a program is not essential, and it can also be realized solely by a configuration using an electronic circuit.
  • the structure of the valuable electronic file issuer (Z) 's Saino ⁇ S) is as follows. That is, the server (S) has a reception part, an electronic file issue part, and an electronic file verification part.
  • the communication device (B) is also used for implementing the present invention.
  • the communication device (B) is connected to other equipment via a communication line.
  • the communication device (B) may constitute a part of the server (S) or may be a separate component.
  • there are various modes for realizing a communication line such as wireless, wired, methanol cable, and optical cable, any of which can be used in the present invention.
  • the communication line may be connected to a communication network such as the Internet. Alternatively, it may be connected to a dedicated line for communication with a specific person.
  • the reception part includes a valuable electronic file issuance acceptance (DO) that accepts a request (C1) from a user (A), and a valuable electronic file issuance acceptance device that performs the acceptance in (S) of the server ( D1). Furthermore, it has a file ID preparation device (D2).
  • This file ID preparation device (D2) is a valuable electronic file (hereinafter sometimes simply referred to as an electronic file) generated after the user has paid the consideration in the above user request.
  • the file ID (E2) is prepared by taking out or generating the value of securities (El, the value of securities below) and the one prepared in advance according to the received request. For example, file IDs are numbered sequentially so that the same file ID is not prepared more than once. A random number or the like may be used.
  • the random number may be a pseudo-random number.
  • the receiving part has a collation data preparation device (D3).
  • the collation data preparation device (D3) is the same as the file ID preparation device (D2) that prepares the fill ID, the power to extract from the prepared one, and the generated collation data (E3) (hereinafter referred to as collation Data may be described as verification information).
  • E3 collation Data
  • the electronic file issuing part has a management data recording device (F2) and an electronic file creation device (F1).
  • the management data recording device (F2) uses the above-mentioned securities value (E1), the above file ID (E2), and the above collation data (E3) as management data (H2) for management on the external storage device (G).
  • the electronic file creation device (F1) records the securities value (N4), file ID (N3), and verification data (N5) that are the same management data (N2) as the management data (H2). Create an electronic file (N1).
  • the content recorded in the external storage device (G) is read once and shown as if an electronic file has been created.
  • the electronic file (N1) containing the management data created here may contain the file ID (N3), the value of the target securities (N4), and data for verification (N5).
  • An electronic file is a unit for storing a series of bit strings in a computer or a memory medium connected to the computer.
  • the value of securities (E1) is information representing the value represented by securities. For example, it may be a value indicating the monetary value itself in dollars, or an identification number for representing various values as will be described later (for example, it may be described as a value ID). . When described as a value ID, the value ID may be the same as or different from the file ID described above. The value ID may be the same as or different from the verification data.
  • the value of securities (E1) includes image information obtained by photographing banknotes, etc.! /.
  • N5 may be an encrypted version of E3 (the reverse may be true, and both N5 and E3 may be encrypted with different keys).
  • the bit arrangement will be physically different before and after encryption.
  • N5 and E3 are substantially the same in the sense that the same bit arrangement can be physically obtained by decoding. That is, N5 and E3 are the same.
  • the securities value (N4) includes image information such as banknotes so that the value can be checked when online communication with the server (S) is impossible.
  • the management file HI
  • the management data is also judged to be the same. If necessary, the determination of whether the file IDs are the same can be added to the determination of the same power as management data.
  • the electronic file verification part has an electronic file receiving device (U, management data reading device (I), management data verification device (K), and usage management rewriting device (Q).
  • the device (L) receives the electronic file (P1) presented from the terminal (T) of the user (A)
  • the management data reader (I) receives the file ID in the received electronic file (Ml).
  • the securities value (J2) and verification data (J3) recorded in the management data (H2) stored in the external storage device (G) having the same file ID (J1) as (M2) are read.
  • the management data matching device (K) compares the value of securities (M3) and matching data (M4) in the received electronic file (Ml) and determines whether or not they have the same power.
  • the electronic file has been described as having three parts: a file ID, a value of securities, and verification data. It is indispensable to include the value of securities in the electronic file by managing the correlation data and the value of securities in the server (S) managed by the electronic file issuer (Z) or the like. is not.
  • the bit length of the verification data sufficiently long, it is possible to prevent the two verification data from matching. For this reason, when the verification data is not encrypted and stored in the server (S) as it is, the file ID can be substituted with the verification data. Therefore, if the verification data is not encrypted and is stored as it is (Sinno ⁇ S), the file ID is also indispensable! /.
  • the value of the securities included in the electronic file can be determined to know what value the securities electronic file is associated with.
  • the user obtains a hash value by applying a hash function, which is a kind of irreversible function such as SHA-1 (Secure Hash Algoritm-1), to the verification data.
  • the hash value is transmitted to a management server such as a valuable electronic file issuer (Z).
  • a management server such as a valuable electronic file issuer (Z).
  • the server (S) managed by the valuable electronic file issuer (Z), etc. it is obtained by applying the above hash function to the verification data of the management data stored in the external storage device (G).
  • the hash value and the securities value are associated in advance.
  • the server (S) When the server (S) receives the hash value sent from the user side, it searches for the securities value associated with the received hash value, and returns the searched securities value to the user side. . In this way, it is possible to prevent the verification data from leaking to a third party by transmitting the hash value of the verification data.
  • the file ID of the electronic file is an identifier for identifying the electronic file.
  • An identifier is information for uniquely selecting one data from a large number of data.
  • the data here is management data recorded in an electronic file, and is stored in a management file (HI) in the external storage device (G).
  • the selection here refers to reading the management data having the same file ID as the file ID in the electronic file received from the terminal (T) from the external storage device (G) in the electronic file verification part. That is. Specifically, the reading is performed by the management data reader (I). As an irregular reading method, as described above, the hash value of the verification data is associated with the management data, stored in an external storage device (G), and the management data is read with the received hash value. is there. Even in this case, since one piece of data is uniquely selected, the hash value of the verification data has a role as an identifier! /.
  • the identifier is used to uniquely select one piece of data, and therefore the identifier is stored on the storage side (S), particularly in the external storage device (G).
  • encryption is performed with the same key (key) for all identifiers or with a small number of keys (for example, about 5).
  • An identifier is given, and selection is performed by encrypting the given identifier and making a selection. It is therefore virtually impossible to encrypt individual identifiers with different keys. This is because as the number of management data stored in the external storage device (G) increases, it becomes necessary to encrypt the given identifier with the key of the number of management data stored. Obtaining the above hash value can be regarded as encrypting all management data with the same key.
  • the verification data for each management data can be encrypted with a different key and stored in the external storage device (G).
  • the electronic file collation part reads the management data stored in the external storage device (G) with the file ID in the received electronic file, and decrypts the read management data with the received key. It may be determined whether the received data is the same as the verification data of the electronic file.
  • the configuration for encrypting each verification data with a different key will be described again in the section “10. Prevention of theft by encryption”.
  • the configuration of terminal (T) of user (A) is as follows. It has a communication device (B) connected to another device via a communication line, an electronic file storage device (C), and an electronic file presentation device (P5).
  • the electronic file storage device (C) stores the electronic file (N1) received from the third party who received the valuable electronic file using this system or the external storage device (C). Save to D). It may be stored after being encrypted.
  • the electronic file presentation device (P5) retrieves the electronic file (N) stored in the external storage device (D), and uses the retrieved electronic file (P1) as the server (S) of the valuable electronic file issuer (Z). ).
  • the terminal (T) is easy to implement by putting a program in a PC or mobile terminal. Since PCs and mobile terminals have display screens, it is easy to display the value of securities as described above.
  • the user (A1) brings the securities (U1) to the issuer (Z) as shown in the flow of securities (R1) or pays the issuer (Z) for the securities.
  • the user (A1) uses the terminal (T1) to connect to the issuer (Z) server (Z) via a communication line, etc., and the flow of valuable electronic file delivery (HI) is shown.
  • the valuable electronic file (D1) is transferred to the terminal (T1).
  • Receive. the user (A1) receives the valuable electronic file (D1) recorded on the recording medium at the issuer's (Z) window. Also, it may be received as a character ⁇ IJ printed on paper or as a barcode, and input or read into the terminal (T1).
  • the user (A1) uses the terminal (T1) to the recipient (A2) terminal (T2) via the communication line as shown in the flow (H2) of passing the valuable electronic file, Receive a valuable electronic file (D1).
  • the terminal (T1) of the user (A1) and the terminal (T2) of the user (A2) will be connected at the same time. Will be sent and received via. It is also possible for the recipient to download the encrypted file that has been uploaded to a public server so that the recipient can decrypt it.
  • FIG. 15 shows a period from when the server (S) of the valuable electronic file issuer (Z) receives the management data issue request from the user terminal (T1) to when the management data is output.
  • the flowchart of the process performed by the server (S) is shown.
  • step S 1501 a process of waiting for a management data issue request is performed. For example, it waits until the valuable electronic file issue acceptance device (D1) issues a signal for accepting the issue of the valuable electronic file. As shown in Fig. 15, the processing of S 1501 does not need to be realized in a busy loop. Specifically, it may be realized by issuing a WAIT system call provided by the Sano (S) operating system. . As a result, the valuable electronic file issue acceptance device (D1) can enter a waiting state until a signal for accepting the issue of the valuable electronic file is issued, thereby eliminating unnecessary operations.
  • S Sano
  • FIG. 16 shows an example of a management data issue request expressed in XML (extensible Mark-up Language) format.
  • ku management data issuance request> indicates the contents of the management data issuance request.
  • the contents and amount of securities are shown.
  • “$ 10,000” is surrounded by “ ⁇ value >>” and “ ⁇ value>”, so that management data showing the value of $ 10,000 is required to be issued. It is shown.
  • the value of $ 10,000 is that the user pays the valuable electronic file issuer (Z) with a credit card, makes a bank transfer, or provides cash to the valuable electronic file issuer (Z). Bring in Make a payment. Also, a valuable electronic file issuer (Z) can lend the user $ 10,000! /.
  • step S 1502 the server (S) acquires the content of the value included in the management data issue request.
  • the management data issuance request shown in Fig. 16 “10,000 dollars” is acquired as the content of the value.
  • step S1503 the contents of the value acquired in step S1502 are registered.
  • "10,000 dollars" is registered.
  • Registration is realized, for example, by populating a table formed in a nonvolatile memory unit (for example, a magnetic disk) of the server (S).
  • a 10-byte length is secured as the value ID, which is an ID for identifying the registered value
  • a 502-byte length is secured as the content of the value
  • a record is 512 bytes long. Enter the value and its ID.
  • the length of one record can be made variable by devising a file structure that is not limited to a fixed length.
  • FIG. 17 shows an example of a table 1701 in which value IDs are associated with value contents and value contents are registered.
  • Table 1701 consists of columns named “Value ID” and “Value Content”, and the value ID value and value content value are stored in the record.
  • the value ID may be a serial number, for example.
  • the power that mainly stores the monetary value as the value of the value content a value indicating an arbitrary value (for example, character ⁇ IJ) may be stored.
  • a value representing a voucher for example, a rice ticket or a beer ticket
  • a boarding ticket for example, a concert admission ticket, etc.
  • a value ID is acquired.
  • the value ID here is an ID assigned to the value registered in step S1503.
  • a counter that counts the number of records held in the table 1701 is provided in the monitor (S), and the value ID may be acquired by reading the value of the counter.
  • the length of one record is a fixed length of 512 bytes, it may be a quotient according to the size of 512 of the file in which the table 1701 is stored.
  • the value of securities (for example, E1) and the file ID (for example, E2) in FIG. 1 can be considered to correspond to the "content of value” and "value ID” described here.
  • the file ID is There are various correspondences between file IDs and value contents that do not need to be directly associated with value contents.
  • step S1505 valid collation data is generated.
  • the process of step S1505 corresponds to, for example, the process in the collation data preparation device (D3) in FIG.
  • verification data it is desirable that the same verification data is not generated more than once.
  • prediction of future verification data cannot be performed by a third party. Therefore, for example, random numbers with a length of 64 bits, 254 bits, 1024 bits, or longer can be generated, and the history of random numbers used as valid matching information can be stored on a magnetic disk or the like. If the generated random number is not included in the history, the generated random number is added to the history and used as valid verification information.
  • the verification data may be generated when necessary, or a plurality of verification data is generated in advance and stored in a storage medium such as a magnetic disk. It may be read when needed.
  • valid verification information is managed in association with the value of securities (value contents). That is, it is stored as data constituting a part of the management data in the external storage device (G).
  • the verification information is managed by the server (S) in association with information on whether or not the verification information is valid ("Effectiveness information" and!, U)! Indicates that the validity information associated with the verification information is valid.
  • the verification information may be stored after being encrypted. For example, each time verification information is generated, a key may be generated, and the verification information may be encrypted and stored with the key. Then, the key may be output together with the management data or separately in step S 1508 described later.
  • step S 1506 the direct ID acquired in step S 1504 is associated with the verification information generated in step S 1305! /, And the value ID and the verification information are stored. I do .
  • the collation information becomes valid collation information in the above definition.
  • the association is performed by inserting a record including a value ID and matching information into a specific table.
  • the as such a table for example, as shown in FIG. 18, a table 1801 composed of records made up of collation information and value IDs is used.
  • Such power is stored as a management file (HI) in the external storage device (G).
  • step S1507i the management data including the verification information generated in step S1505 and associated with the value ID in step S1506 is generated.
  • the verification data may be used as management data as it is.
  • Information such as the creation date and time may be further added.
  • the management information may be generated by encrypting the verification information with a predetermined encryption key. For example, you may encrypt with the public key corresponding to the private key which a user has.
  • FIG. 19 shows an example of management data.
  • the value ID acquired in step S 1504 is “01236”
  • the verification information generated in step S 1505 and associated with the direct ID in step S1506 is “12345abcde7654”. It is expressed as XML data including them as they are.
  • the value ID it is convenient to know the contents of the value represented by the management data.
  • the user can know the contents of the value by sending a value ID to Saino S), making an inquiry, and receiving the reply.
  • the value ID to (Sanno ⁇ S)
  • the verification information having the received hash value is It is possible to check whether it is associated with the received value ID and return the value content.
  • image data indicating the value may be included.
  • the image data indicating the value may be, for example, image data of an entrance ticket represented by management data, or image data of money represented by management data. If image data is included in the management data and the size of the management data increases, the probability of damage, forgery, alteration, etc. increases. Therefore, in order to detect whether or not it is corrupted, checksums of verification information and image data, etc., and hash values of verification information and image data, etc. are stored in management data using a secret key such as a server (S).
  • the encrypted signature data may be included in the management data.
  • step S1508 the management data generated in step S1507 is output.
  • the management data is stored until the user terminal connects to the server (S), and it is detected that the user terminal is connected to the server (S) and transmitted.
  • it may be printed on a medium such as paper as a character string or printed as a barcode, and mailed.
  • FIG. 20 is performed between the issuance requesting terminal 2001 such as the terminal (T) used by the user to request the issuance of management data, and the server device 2002 such as Saino ⁇ S). It is a sequence diagram explaining the process of communication.
  • step S2003 an issue request for management data is transmitted from the issuer requesting side terminal 201 to the server apparatus 2002.
  • the processing of the flowchart shown in FIG. 15 is for server device 2002! /, And another server device connected to server device 2002 (this other server device may be server (S)! / )).
  • the output management data is transmitted to the issuer requesting side terminal 2001 in step S2004.
  • Issuer requesting terminal 2001 performs management data storage processing, etc.
  • issuance request side terminal 2001 transmits a management data issuance request, and the management data issued thereby is transmitted to issuance request side terminal 2001.
  • information specifying the transmission destination of the management data to be issued is not limited to this form.
  • the server apparatus 2002 may transmit management data to a designated transmission destination.
  • the recipient (A2) uses the terminal (T2) to connect to the server (S) of the issuer (Z) via a communication line and presents the valuable electronic file (D1). If the server (S) can confirm that it is a valid valuable electronic file issued by the issuer (Z) (that is, if it can be confirmed that the verification data is valid), the server (S) can rewrite the valuable electronic file. As shown by the flow (K1), Receive a valuable electronic file (D2) obtained by rewriting the application information. Details of this part will be described later in the section “4. How to Receive and Confirm Valuable Electronic Files Through a Server”. The recipient (A2) uses the terminal (T2) to connect to the server (S) of the issuer (Z) via the communication line, designates the new recipient (A3), and flows the valuable electronic file. As shown in (H3), present the valuable electronic file (D2).
  • the valuable electronic file includes a file ID (for example, N3)
  • the file ID may be rewritten together with rewriting of the verification information.
  • the valuable electronic file issuer (Z) may collect a rewriting fee. This fee may be collected by changing the amount of value or content of value associated with the verification information.
  • the value ID may be rewritten along with the amount of value and the content of the value. For example, a new value ID is associated with $ 9,999, which is the remainder of the $ 10,000 charge, and the new value ID is associated with new matching information! / Yo! /
  • the issuer (Z) collates the presented valuable electronic file (D2) using the server (S) and confirms it (that is, if the collation data can be confirmed to be valid). For example, the verification data is rewritten, and the designated recipient (A3) receives the rewritten electronic file (D3) through the communication line as shown in the flow of valuable electronic file (H4). Details of this part will be described later in the section “3. How to Receive Valuable Electronic Files through the Server”.
  • Designated recipient (A3) uses terminal (T3) and terminal device (T4) of final recipient (A4) via communication line to show the flow of valuable electronic file delivery (H5) In the same way, receive the valuable electronic file (D4).
  • the final recipient (A4) uses the terminal (T4) to connect to the server (S) of the issuer (Z) via a communication line, presents the valuable electronic file (D4), and communicates with the securities.
  • the issuer (Z) collates the submitted electronic file (D4) using Saino ⁇ S) and confirms the validity of the verification data, the flow of securities ( Deliver or exercise the securities (U1,) as shown in R2). Details of this part will be described later in the section “8. How to exchange valuable electronic files with securities”.
  • the securities (Ul) are delivered from the user (Al) to the final recipient (A4).
  • the securities (U1 ') delivered to the final recipient (A4) may be the same as those brought in by the user (A1), but the exercise of the rights held by the securities (U 1) If the contents of are the same, they need not be physically the same. Of course, if fees are collected by rewriting the verification information, the details of the exercise of the rights held by the securities (U1 ') and the exercise of the rights held by the securities (U1) are strictly Are not the same, but can be considered substantially the same considering the fees collected.
  • Marketable securities include ordinary securities (stock certificates, bonds, gift certificates, bonds), tickets that represent the right to receive services, securities such as magnetic cards such as telephone cards, points for games, shopping, etc. There are securities such as. In addition, vouchers (rice tickets, beer tickets) that represent the right to receive goods are also securities.
  • this system can be considered as a system for transferring the rights of securities, and there is no entity of securities. In either case, even if the rights are exercised only with valuable electronic files, the principle of system delivery will not change! Of course, printed materials such as tickets, coin-like jutons, game chips, etc. that can be exercised when using valuable electronic files may be handed over.
  • the issuer of a valuable electronic file or a person who has a contractual relationship with it guarantees the rights of goods and securities or their vouchers.
  • Valuable electronics In order for the file issuer to secure the rights of the securities or tickets, the first user pays for the goods and securities, or issues the electronic files with the securities. I have to bring it to the person! / If the valuable electronic file according to the present invention is delivered! /, !, and if securities can be delivered via a communication line, it is not necessary to go to the issuer of the valuable electronic file and bring it in. Can be brought in via a communication line.
  • Payment by credit card is the most used on the Internet. This method can be completed only within the Internet. There are many others, but details are omitted. Naturally, there are various ways to transfer valuable electronic files, including the transfer of consideration (things and services) between the parties, in the real economy as well as on the virtual network. Is omitted.
  • FIG. 21 is a functional block diagram of a server device that, when receiving management data, invalidates the verification information included in the management data and transmits the management data obtained by replacing the management data with another verification information. Indicates.
  • management data can be transferred by transmitting management data to another user via such a server device.
  • this server device makes management data that can be used only by the user who receives the management data from other users by sending the received management data and receiving the returned management data. You can also.
  • the server device was stolen by sending the stolen management data before the stealer used it. Management data can also be invalidated.
  • server device 2100 includes a communication interface 2101, a reception unit 2102, a determination unit 2103, an invalidation unit 2104, a collation information preparation unit 2105, a replacement unit 2106, and a transmission unit 2107.
  • the communication interface 2101 is a unit that communicates with a terminal.
  • a terminal is a device operated by a user.
  • the communication interface 2101 is a hardware device (for example, a communication device) for exchanging data with the outside of the server device 2100. (B)), and device drivers for driving such hardware devices.
  • the communication interface 2101 when data transmitted to the server device 2100 is received from the outside of the server device 2100, the communication interface 2101 generates an interrupt, activates a function corresponding to the interrupt, and the like to a predetermined buffer.
  • the data may be read by a program operating in the server device 2100.
  • the communication interface 2101 determines whether there is data in which a program operating inside the server apparatus 2100 has written data at a predetermined address. If there is such data, send it to the outside.
  • Receiving section 2102 is a section that receives management data transmitted from the terminal, including verification information that can be determined as valid or invalid, using the communication interface.
  • the receiving unit 2102 may be realized as an independent device.
  • the receiving unit 2102 may be an electronic file receiving device (U may be used.
  • the receiving unit 2102 may be incorporated in the server device 2100.
  • it may be realized by a program.
  • Such a program may, for example, issue a WAIT system call to a specific file descriptor! /, And if the file descriptor force and management data can be read, read processing is performed.
  • the management data includes verification information, which can be determined whether the server device 2100 is valid or invalid.
  • the management data is transmitted mainly from the terminal operated by the user, as another mode such as a bank or a credit card company. It may be sent from any company's server, etc.
  • the server that sends such management data is also considered a type of terminal.
  • the determination unit 2103 determines whether the verification information included in the received management data is valid or invalid. In FIG. 1, this validity is determined by (1) the management data reader (I) using an electronic file receiving device (an electronic file having the same file ID as the file ID (N3) of the electronic file (M) received by U). File (J 1) is read from the external storage device (G). (2) The management data verification device (K) determines whether the verification data (M5) and the verification data (J4) are the same. Alternatively, the flowchart of FIG. Judgment is made based on whether or not the managed server (S) is effectively managed in association with the value ID.
  • the server device 2100 and the server (S) are the same, for example, it is determined whether or not they are stored in one of the records in the table 1801 shown in FIG. Also, if the server device 2100 and the sano (S) are different! /, The server device 2100 inquires of the server (S) whether it is valid. Therefore, the management data may include the address of the server that generated the verification information. Server apparatus 2100 makes an inquiry using the address.
  • the invalidation unit 2104 invalidates the verification information when it is determined that the verification information is valid. Invalidation is realized by rewriting the verification data of the management data stored in the external storage device (G) by the usage management rewriting device (Q) in FIG. Alternatively, for example, the collation information is overwritten with another value, for example, a null value, from the record of the table 1801 holding the collation information. If the server apparatus 2100 and the server (S) are different, a request for invalidating the verification information is transmitted from the server apparatus 2100 to the server (S).
  • the collation information preparation unit 2105 prepares new valid collation information.
  • the verification information is generated as described in step S 1505 of the flowchart of FIG. This processing may be performed by the server (S) inquiring about the validity of the verification information, or may be performed by the server device 2100.
  • the replacement unit 2106 is replaced management data that is management data obtained by replacing the invalidated verification information in the received management data with the prepared new valid verification information. Is generated.
  • the determination unit 2104 determines that the collation information “12345abcde7654” included therein is valid. Then, the invalidation unit 2104 invalidates the verification information “12345abcde7654”. Then, it is assumed that “987654321ZYXU” is prepared as new valid collation information in the collation information preparation unit 2105.
  • the replacement unit 2106 replaces “12345abcde7654” in the management data 1901 with “987654321 ZYXU” to generate replaced management data.
  • Replaced management When generating data, copy the contents of the memory or other area where management data 1901 is stored to create a copy of the management data, and rewrite the verification information contained in the management data copy to replace the management data. It is good.
  • the verification information included in the management data may be directly rewritten to obtain replaced management data.
  • replacement section 2106 associates value ID “01236” with “987654321ZYXU”. As will be described later, this association is performed by the server apparatus 2100 if the server apparatus 2100 has a memory unit. If the server device 2100 does not have a memory unit, an external device that manages the effectiveness so that the usage management rewriting device (Q) requests the external storage device (G) as shown in FIG. Ask to.
  • the above-described processing by the collation information preparation unit 2105 and the substitution unit 2106 is performed collectively by rewriting collation data.
  • Transmitting section 2107 transmits the replaced section management data to the terminal or a terminal different from the terminal using the communication interface. That is, the replacement part management data is written to a predetermined address, and the communication interface 2101 is caused to transmit data.
  • the transmission destination is, for example, a terminal that causes the reception unit 2102 to receive management data.
  • information about the destination e-mail address, IP address, etc.
  • the replacement unit is managed at the destination. The data will be sent and it's okay.
  • FIG. 22 is a flowchart for explaining the flow of processing performed in the server apparatus 2100.
  • step S2201 the communication interface 2 101 enters a waiting state until management data is received. This transition to the waiting state is realized, for example, by issuing a WAIT system call to a specific file descriptor in the receiving unit 2102.
  • step S2202 the management unit received by the communication interface 2101 is read by the receiving unit 2102 and expanded in a working memory. And take out the verification information .
  • the management data 1901 is expanded, 12345 abcde7654 is extracted as collation information.
  • the retrieved verification information is stored in a newly allocated memory area.
  • determination section 2103 determines whether or not the collation information extracted in step S2202 is valid. For example, the verification information stored in the memory area is transmitted to the server (S) to make an inquiry about whether it is effective. If it is determined that the result is not valid, the process proceeds to step S2204 to perform error processing and the like. Or, there may be fraudulent acts, so it may be warned to related organizations.
  • step S2205 the invalidation unit 2104 invalidates the verification information extracted in step S2202. For example, a request for invalidation processing is made to the server (S). Or, (1) Inquiry of validity and (2) Invalidation request if valid, it is possible to fi in one communication.
  • step S2206 the collation information preparation unit 2105 generates new valid collation information.
  • step S 2207 the replacement unit 2106 is operated to replace the verification information in the received management data with the new effective verification information generated in step S 2206. . Thereby, replacement management data is obtained.
  • the obtained replacement management data is stored in a work memory or the like.
  • step S2208 the replaced management data obtained in step S2207 is transmitted by transmission section 2107.
  • FIG. 23 is a functional block diagram of the server device when the server device manages the validity of the verification information in another embodiment of the present invention.
  • Server device 2300 is similar to server device 2100 described above, and includes communication interface 2101, receiving unit 2102, judging unit 2103, invalidating unit 2104, verification information preparing unit 2105, replacing unit 2106, A transmission unit 2107.
  • the memory unit 2301 is included, and the determination unit 2103 includes search means 2302.
  • the memory unit 2301 stores valid verification information. For example, by using the table 1801 in FIG. 18 and the like, the collation information is stored in association with the value ID, thereby storing valid collation information.
  • collation information can be stored in a single-column table without associating it with a value ID, and the information stored in that table is a sufficient condition, necessary condition, or necessary and sufficient condition for effective collation information. /!
  • Search means 2302 performs a search to determine whether or not the verification information included in the received management data is stored in the memory unit. For example, when the collation data is given, the search means 2302 sequentially reads the values in the column of “collation information” in Table 1801 to determine whether or not the same as the given collation information. If there is, it returns the address of the record at that time (for example, the line number indicating the record number on the first line). Alternatively, an index (for example, a B-tree index) defined for the “matching information” column is used to determine whether or not the index search using the given matching information is successful.
  • an index for example, a B-tree index
  • FIG. 24, FIG. 25 (When the table 1801 force memory 2301 in FIG. 18 is taken into consideration, the management data 1901 shown in FIG. 19 is received by the receiving unit 2102 and the search means 2302 It is a figure explaining the process after the search result that the information for matching exists in the 3rd line is obtained by the above. ”Means the collation information stored in the column“ ”.
  • the invalidating unit 2104 deletes the collation information power “12345abcde7654” from the “collation information” column of the third row record in the table 1801 shown in FIG. For example, an empty value that is not the same as another value is overwritten. Due to this overwriting, even if the search for collation information “12345abcde7654” is performed, the search fails and “12345abcde7654” is determined to be invalid collation information.
  • the collation information preparation unit 2105 prepares new valid collation information.
  • New valid verification information is generated by, for example, a pseudo-random number generator, and the generated pseudo-random number is overwritten in the “matching information” column of the record that was previously overwritten by the value NULL. .
  • a value “987654321ZXYU” ⁇ is generated by a pseudo-random number generator or the like, and this value is not a value generated so far by referring to the history of generated pseudo-random numbers. In this case, it is overwritten in the “reference information” column of the record in the third row of the table 1801, and the state shown in FIG. 25 is obtained. As a result, “987654321ZXYU” becomes new effective collation information.
  • FIG. 26 shows the comparison information “12345abcde7654” in the management data 1901 by the replacement unit 2106.
  • FIG. 27 to FIG. 29 illustrate processing in the case where the memory unit 2301 stores valid information indicating whether it is valid or invalid for each of the stored verification information in association with each other. It is a figure.
  • the table 2701 associates the value ID with the verification information, and further associates the value of the column named “state”.
  • the value of the column named “state” is a column that stores a value indicating whether the verification information is valid. For example, in the case of FIG. 27, “123456789ABCDE”, “ABCDE1234567890”, “12345abcde76 54”! /, And the deviation is stored! / Since “valid” and! / Are stored, the determination unit 2103 determines that these pieces of verification information are valid.
  • the search means 2302 reads "12 345abcde7654", the search for the combined use of Juichiro is successful, and the half IJ cut 2103 force l2345abcd e7654 "is stored. Read the recorded record. Then, when the value of the column named “state” is read out, “valid” is stored, so that judgment unit 2103 determines that the collation information “12345abcde7654” is valid.
  • the invalidation unit 2104 invalidates the collation information power S of “12345abcde7654”.
  • the verification information “12345abcde7654” is deleted from the table 2701 as described above.
  • the value of the column named “state” in the read record is set to a value different from “valid” such as “temporarily invalid”. As a result, even if the search for the collation information “12345abcde7654” is performed, it is determined as invalid collation information.
  • collation information preparation unit 2105 prepares collation information "987654321ZXYU” ⁇ , it is written in the record of Table 2701, and the value S of the column named "status” S "valid” In As a result of the change, the collation information “987654321ZXYU” ⁇ is valid.
  • the electronic file of the valuable electronic file has at least the file ID (N3) and the target securities.
  • the same management data is recorded in the file (HI).
  • the system user receives the electronic file (N1) from a valuable electronic file issuer or a third party who receives the electronic file using the system.
  • the electronic file (N1) is prepared by the issuer's server (S).
  • the user takes the electronic file (N1) into the user terminal (T1).
  • the user can use the power S to copy the valuable electronic file (N1) to any recording medium and record it in preparation for loss or theft.
  • the issuer of the valuable electronic file shall manage the management data (N2) recorded in the electronic file (N1) and the management file (HI) recorded in the management file (HI) of the server (S).
  • the management data (J1) having the same file ID (N3) as the file ID in the data (N2) is checked to confirm that it is a valuable electronic file issued by the valuable electronic file issuer.
  • the management data verification device (K) checks whether the verification data (N5) and the verification data (J4) are the same.
  • the Sano (S) prepares an electronic file (Ml) in which the same management data (M2) as the management data recorded in the management file (HI) is recorded.
  • the server (S) of the valuable electronic file issuer receives the electronic file (Ml) prepared in f.) Via the communication line to the terminal (T2) of the designated recipient.
  • the above issuer's server (S) can be accessed directly. This can be achieved by connecting to the recipient's server and uploading an electronic file (Ml).
  • Ml electronic file
  • [Method 1] e-mail [Method 3]
  • TEL, FAX, etc. the link to the server (S) is notified by each means, and the recipient's terminal (T2) sends the server (S) For example, you can download the electronic file (Ml) by connecting to.
  • Fig. 30 (A) shows a sequence when a valuable electronic file (management data) is transmitted from the assigning terminal as the assigning terminal to the assigning terminal as the assigning terminal via the server (S).
  • the figure is shown. That is, the management data 1 is transmitted from the transfer side terminal to the server.
  • an e-mail address or IP address which is information identifying the assignee terminal, is also transmitted.
  • the server determines whether or not the collation information included in the management data 1 is valid. If valid, the collation information is invalidated and new valid collation information is generated. Then, the management information 1 is generated by replacing the verification information in the management data 1 with the generated new valid verification information, and transmitted to the assigning terminal.
  • the system user receives the electronic file (N1) from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the electronic file (N1) is prepared by the issuer's server (S).
  • the user takes the electronic file (N1) into the user terminal (T1).
  • the user can use the power S to copy the valuable electronic file (N1) to any recording medium and record it in preparation for loss or theft.
  • the above-mentioned valuable electronic file issuer shall manage the management data (N2) recorded in the electronic file (N1) and the management data (HI) recorded in the management file (HI) of the server (S).
  • the management data (J1) having the same file ID (N3) as the file ID in the data (N2) is checked to confirm that it is a valuable electronic file issued by the valuable electronic file issuer.
  • the management data verification device (K) checks whether the verification data (N5) and the verification data (J4) are the same.
  • the above-mentioned valuable electronic file issuer's sanno ⁇ S) is an electronic file (Ml) in which the same management data (M2) as the above management data recorded in the above management file (HI) is recorded. Prepare ⁇ ⁇ .
  • FIG. 30 (B) shows a case where management data is transmitted from the assigning terminal to the assigning terminal without passing through the server, and the assigning terminal transmits the management data to the server to replace the verification information.
  • a sequence diagram is shown. That is, the assigning terminal transmits the management data 1 and the assigning terminal receives it without going through the server (S). For example, the management data 1 is transmitted and received using peer-to-peer communication. Alternatively, the management data 1 is transmitted and received via a server different from the server (S). The assigning terminal transmits the received management data 1 to the server (S). If the collation information included in the management data 1 is valid, the server (S) generates new valid collation information.
  • the verification information of the management data 1 is replaced with the generated new valid verification information, so that the management data 2 is generated and transmitted to the assigning terminal.
  • Fig. 30 (B) there is a time between the receiving terminal receiving management data 1 and sending it to the server, but it prevents double transfer of management data 1 by the transferring terminal. Therefore, it is preferable that the receiving terminal transmits the management data 1 to the server immediately after receiving it. Further, since the server (S) only has to send the replaced management data back to the transmission source of the management data, the server (S) mechanism is simplified.
  • FIG. 30 (C) shows a sequence diagram of a transmission / reception mode different from those in FIGS. 30 (A) and 30 (B).
  • the assigning terminal transmits management data to the server, receives management data in which the verification information included in the management data is replaced, and transmits the management data to the assigning terminal.
  • the transfer side terminal transmits management data 1 to the server (S). If the verification information contained in the management data 1 is valid, the server (S) generates new effective verification information. Then, the verification information in the management data 1 is replaced with the generated new valid verification information to generate the management data 2 and send it back to the assigning terminal.
  • the transferring terminal transfers the received management data 2.
  • the server (S) only has to return the replaced management data to the management data transmission source, so the mechanism of the server (S) is simplified.
  • the management data at the transferring terminal it is possible to check the validity and transfer it to the power transferring terminal.
  • the electronic file of the valuable electronic file (Nl) has at least the file ID (N3), the value of the subject securities (N4) and the data for verification (N5) (the three are managed below)
  • the system user receives the electronic file (N1) from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the electronic file (N1) is prepared by the issuer's server (S).
  • the user takes the electronic file (N1) into the user terminal (T1).
  • the user can use the power S to copy the valuable electronic file (N1) to any recording medium and record it in preparation for loss or theft.
  • the above-mentioned valuable electronic file issuer shall manage the management data (N2) recorded in the electronic file (N1) and the management data (HI) recorded in the management file (HI) of the server (S).
  • the management data (J1) having the same file ID (N3) as the file ID in the data (N2) is checked to confirm that it is a valuable electronic file issued by the valuable electronic file issuer.
  • the management data verification device (K) checks whether the verification data (N5) and the verification data (J4) are the same.
  • el. When confirmed in the above d.),
  • the above-mentioned sign S is used for verification in the management data (J1) recorded in the management file (HI) of the server. Rewrite and record the data, e2.) Or disable the management data (J1) recorded in the management fin (HI) of the above Sano (S) and e3.) Issue new management data Prepare from the already created ones.
  • new management data different from the rewritten or prepared management data is prepared, and two management data are prepared together.
  • the total value of securities shall be equal to or less than the value of securities in the management data of the above presented electronic files.
  • E5) Record in the management file (HI). For example, if the securities in the management data of the presented electronic file are of a monetary value of $ 10,000, the value of one of the two management data is The value of the other securities will be $ 7,000. How to divide is specified, for example, when a valuable electronic file is presented. Also, if the securities in the management data of the above-mentioned valuable electronic file represent the contents of the train A boarding pass and the boarding pass of Aircraft B, one of the two management data. One securities will represent the train A boarding pass, and the other securities will represent the boarding pass of aircraft B.
  • the server (S) of the valuable electronic file issuer sends one of the two electronic files (Ml, L1) prepared in f.) Above the designated recipient via a communication line.
  • the system user receives the electronic file (N1) from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the electronic file (N1) is prepared by the issuer's server (S).
  • the user takes the electronic file (N1) into the user terminal (T1).
  • the user can use the power S to copy the valuable electronic file (N1) to any recording medium and record it in preparation for loss or theft.
  • the user presents the electronic file (N1) by connecting to the server (S) of the issuer of the valuable electronic file through a communication line using the terminal (T1).
  • the issuer of the valuable electronic file may manage the management data (N2) recorded in the electronic file (N1) and the management file (HI) recorded in the management file (HI) of the server (S).
  • the management data (J1) having the same file ID (N3) as the file ID in the data (N2) is checked to confirm that it is a valuable electronic file issued by the valuable electronic file issuer.
  • the management data verification device (K) checks whether the verification data (N5) and the verification data (J4) are the same.
  • the server (S) of the valuable electronic file issuer sends the two electronic files (Ml, L1) prepared in f.) Above the terminal (T1) of the user via the communication line. To receive.
  • the electronic file of the valuable electronic file (Nl) has at least the file ID (N3), the value of the subject securities (N4) and the data for verification (N5) (the following three are managed
  • the system user receives the electronic file issuer or a third party who has received the electronic file using the system. Receives the above electronic files (Nl, L1). In either case, the above electronic files (Nl, L1) were prepared by the publisher's Sanno S). The user takes the plurality of electronic files (Nl, L1) into the user terminal (T1). Users can copy and record valuable electronic files (Nl, L1) to any recording media in preparation for loss or theft.
  • the issuer of the valuable electronic file stores the management data (N2, L2) recorded in the plurality of electronic files (Nl, L1) and the management file (HI) of the server (S). Issuance of valuable electronic file issuer by collating the management data (Jl, PI) having the same file ID (N3, L3) with the file ID in the recorded management data (N2, L2) Confirm that it is a valuable electronic file.
  • the management data matching device (K5) can be used to check whether the matching data (N5) matches the matching data (J4), and whether the matching data (L5) and the matching data (P4) have the same power. ) To confirm.
  • the above-mentioned sign ⁇ S) is the management data (J1, P1) recorded in the management file (HI) of the server.
  • the management data (J4 or P4) in any one of the management data is rewritten and recorded, and the plurality of management data (HI) recorded in the management file (HI) of the remaining server (S) is recorded.
  • J1 or P1) Force to disable all, e2.) Or all the management data (J1 and P1) recorded in the management file (HI) of the server (S) .
  • the above-mentioned value electronic file issuer, Saino ⁇ S) is the same management as the management data of the value (M4) of the total value of securities recorded in the above management file (HI).
  • the term “sum” as used herein refers to the result of calculating the sum of numerical values if it is possible to calculate the sum of numerical values. For example, if the value cannot be determined, for example, if the value is different in monetary units, or if it is a train ticket and a boarding pass for an aircraft, it means the result of calculating the sum as a set including those values as elements.
  • the server (S) of the valuable electronic file issuer causes the user terminal (T1) to receive the electronic file (Ml) prepared in step f.) Via a communication line.
  • the electronic file of the valuable electronic file (Nl) has at least the file ID (N3), the value of the subject securities (N4) and the data for verification (N5) (the following three are managed (Say data)
  • the system user receives the electronic file (N1) from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the electronic file (N1) is prepared by the issuer's server (S).
  • the user takes the electronic file (N1) into the user terminal (T1).
  • the user can use the power S to copy the valuable electronic file (N1) to any recording medium and record it in preparation for loss or theft.
  • the user presents the electronic file (N1) by connecting to the server (S) of the issuer of the valuable electronic file through a communication line using the terminal (T1).
  • the issuer of the valuable electronic file shall manage the management data (N2) recorded in the electronic file (N1) and the management file (HI) recorded in the management file (HI) of the server (S).
  • the management data (J1) having the same file ID (N3) as the file ID in the data (N2) is checked to confirm that it is a valuable electronic file issued by the valuable electronic file issuer.
  • the management data verification device (K) checks whether the verification data (N5) and the verification data (J4) are the same.
  • the electronic file of the valuable electronic file (Nl) contains at least the file ID (N3), the value of the subject securities (N4) and the data for verification (N5) (the following three are managed
  • the system user receives the electronic file issuer or a third party who has received the electronic file using the system.
  • the above-mentioned electronic files (Nl, L1) are received. Izu In this case, the above electronic files (Nl, LI) were prepared by the publisher's Sanno S).
  • the user takes the plurality of electronic files (Nl, L1) into the user terminal (T1). Users can copy and record valuable electronic files (Nl, L1) to any recording media in preparation for loss or theft.
  • the above-mentioned valuable electronic file issuer stores the management data (N2, L2) recorded in the plurality of electronic files (Nl, L1) and the management file (HI) of the server (S). Issuance of valuable electronic file issuer by collating the management data (Jl, PI) having the same file ID (N3, L3) with the file ID in the recorded management data (N2, L2) Confirm that it is a valuable electronic file. For example, check with the management data verification device (K) whether the verification data (N5) is the same as the verification data (J4), and whether the verification data (L5) is the same as the verification data (P4) To do.
  • the above-mentioned Sano S S) stores all the management data (Jl, PI) recorded in the management file (HI) of the server.
  • c above is the total of the value (L4, M4) of securities in the two renewed or prepared management data (L2, M2) recorded in the management file.
  • HI value in the above management file (HI) with a value equal to or less than the sum of the values (J3, P3) of the securities in the two management data (J1, P1) of the electronic file presented in
  • the server (S) of the valuable electronic file issuer sends the two electronic files (Ll, Ml) prepared in f.) Above the user terminal (T1) via a communication line. To receive.
  • L1 may be discarded and not transmitted to T1. For example, if all values of a VI are reduced and no longer worth it, the VI may be discarded and L1 may not be sent to the user's terminal.
  • Each of the users and recipients of the system receives the electronic files (N1, L1) from the valuable electronic file issuer or the third party who received the electronic file using the system. . In either case, the electronic file (Nl, L1) is prepared by the issuer's server (S). The user and recipient receive the electronic file (Nl, L1) into their terminal (Tl, ⁇ 2). Users and recipients can copy valuable electronic files (Nl, L1) to any recording medium and record them in case they are lost or stolen.
  • the above-mentioned valuable electronic file issuer is recorded in the management data (N2, L2) recorded in the electronic file (Nl, L1) and the management file (HI) of the server (S).
  • the management data (J1, PI) having the same file ID (N3, L3) as the file ID in the management data (N2, L2) is collated and the value issued by the valuable electronic file issuer Confirm that it is an electronic file. For example, whether the collation data (N5) matches the collation data (J4), and whether the collation data (L5) and collation data (P4) are the same Confirm with.
  • the server (S) of the valuable electronic file issuer receives the two electronic files (Ml, L1) prepared in f. To the customer's terminal (T1, T2).
  • the file ID of the management data (K1) recorded in the management file (F) of the issuer ( ⁇ ) of the valuable electronic file, the value of the securities, and at least the verification data We will explain how to encrypt the data and send the decryption key (G) to the user's terminal along with the electronic file (D) or receive it by the user.
  • the composite (G) key should not be recorded on the issuer side as well as in the server of the valuable electronic file issuer.
  • an encryption key is generated, and at least the verification data is encrypted with the encryption key and recorded in the management file (F). Is good.
  • the above-described decryption key (G) is a key for decrypting encryption using the generated encryption key.
  • management data (K1) in the management file (F) of the issuer (Z) of the valuable electronic file the management data is encrypted by encrypting at least the verification data. Record the data (K2). At this time, it is preferable that an encryption key is generated each time, and at least the verification data is encrypted and recorded with the generated encryption key.
  • the issuer (Z) of the valuable electronic file sends the decryption key (G) and the same valuable electronic file (D) to the prepared valuable electronic file (K1) to the user. Receive.
  • the decryption key (G) may be received by the user at the same time as the valuable electronic file (D) or at a different time. It may be allowed. Further, the path for allowing the user to receive the decryption key (G) and the valuable electronic file (D) may be the same or different.
  • the valuable electronic file (D) may be sent by e-mail and the decryption key (G) may be sent by facsimile.
  • the decryption key (G) is a decryption key corresponding to the generated decryption key.
  • the encryption key and the decryption key are the same.
  • the encryption key is, for example, a secret key
  • the decryption key is a public key.
  • the user presents the decryption key (G) and valuable electronic file (D) to the valuable electronic file issuer's server (S).
  • the decryption key (G) and the valuable electronic file (D) may be presented at the same time or may be presented at different times. Further, the route of presentation may be the same or different.
  • the issuer of the valuable electronic file decrypts at least the management data (K2) in which the verification data is encrypted using the decryption key (G) attached to the presented valuable electronic file (T).
  • the management data (K2) is management data obtained by searching the management file (F) for management data having the same file ID as the file ID of the presented valuable electronic file (T). Therefore, in this section, the management data includes the file ID, and the file ID included in the management file recorded in the management file (F) of the server (S) is plain text or the server (S ) Is encrypted with an accessible key! /
  • the replacement data is recorded as data on an electronic medium, and can be operated by a person because the terminal is extremely powerful. Even long data beyond the range you can remember is possible.
  • the password or confirmation data cannot be used by the acquirer even if it is stolen or lost.
  • legitimate users can use it from a copy. In this way, the security of valuable electronic files can be increased.
  • the usage is assumed to be the case where user (A) wants to access the WWW server of recipient (B) and deliver securities to recipient (B) at a certain site.
  • the user (A) and the recipient (B) are connected in advance via a communication line!
  • the recipient ID (C) is determined between both parties, and both parties connect to the issuer's server (S) and use this system.
  • the recipient's WWW server In order to determine the recipient ID (C) between the above user (A) and the above recipient (B), the recipient's WWW server issues a sufficiently long random number using CGI, etc. You can download it through the browser. In this case, it is desirable for security to use HTTPS protocol. After that, use your wallet software as a browser plug-in to perform subsequent processing such as presenting an electronic file (N1).
  • the electronic file of the valuable electronic file contains at least the file ID, the value of the relevant securities, and data for verification (the three parties are referred to as management data below). It is also recorded in the management file of the server of the electronic file issuer. In addition, it is possible to make it difficult to tamper with the electronic file by including an image that is visually displayed on the terminal (preferably including a monetary amount), electronic transparency, and folds.
  • the value of securities is recorded in an electronic file! /, So there is no guarantee even offline! /, And the balance can be confirmed in many cases. Moreover, since the value of securities is recorded not only on the electronic file but also on the server side, the above value of the electronic file cannot be altered.
  • [0200] b The user of the system receives the electronic file of a. Above from the valuable electronic file issuer or the third party who received the electronic file using the system. Receive electronic file To do so, you can connect to a server of an online e-mail issuer, a valuable electronic file issuer, or a third party, enter a password, etc. if necessary, and download it. Offline receives media with electronic files.
  • the user uses a terminal to connect to the server of the issuer of the valuable electronic file via a communication line, designates the recipient, and presents the electronic file. It can be presented simply by uploading a file with the server of the issuer of the valuable electronic file as a WWW server.
  • the HTTPS protocol should be used to achieve a secure environment. If it is easy to handle and is popular, dedicated wallet software with FTP-like functions will be required. A series of processing is performed in the program. Also, with dedicated software, both servers become dedicated software across the communication line where the server is dedicated software, and protocol design, new development, etc. can be freely performed, and the design can be designed with sufficient consideration for usability and security.
  • the server of the valuable electronic file issuer compares the management data recorded in the electronic file with the management data recorded in the management file of the server, and issues the valuable electronic file issuer. Confirm that it is a valuable electronic file.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the management file of the server, or the server management The ability to make the management data recorded in the file for use unusable and issue new management data, take out the prepared data, prepare it, and record it in the management file
  • the verification data is rewritten even if the value of securities is not rewritten, if the data is stolen or dropped, the verification data can be rewritten immediately without losing the value. Even for skimming that illegally copies data, skimming must be used before skimming, making skimming difficult. Also, the person who is skimmed knows immediately because the next valuable electronic file cannot be used.
  • skimming In this situation, if skimming is large, the person who is skimmed on the spot must use it before the person who is skimmed, and it is easy for someone who is skimmed to notice on the spot. For example, a large amount of valuable electricity received offline (skimming is offline) If it is requested from a terminal other than the terminal that can know the child file (it is not strange even if it comes in large quantities, stores, etc.), there is a high possibility of skimming or fraud.
  • the valuable electronic file issuer's server prepares an electronic file in which the same management data as the management data recorded in the management file is recorded.
  • the server software must be built with dedicated software. This can be easily constructed by recording the necessary data using the SQL database as a management file and using the file ID as a key.
  • the valuable electronic file issuer's server causes the user's terminal to receive the electronic file prepared in f. Above via a communication line.
  • the first securities delivery system using the following valuable electronic files consisting of a to g: a. For electronic files of valuable electronic files, at least the file ID, and the value and value of the relevant securities (The three are referred to as management data hereinafter), and this management data is also recorded in the management file of the server of the electronic file issuer. b. The system user receives the electronic file of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user uses a terminal to connect to the server of the issuer of the valuable electronic file via a communication line, designates the recipient, and presents the electronic file.
  • the valuable electronic file issuer's server collates the management data recorded in the electronic file with the management data recorded in the management file of the server, and the valuable electronic file issued by the valuable electronic file issuer. Confirm that it is a file.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the server management file, or the server management file. Disabling the recorded management data, new management data Prepare and record in the above management file.
  • the server of the electronic file issuer prepares an electronic file in which the same management data as the management data recorded in the management file is recorded.
  • the valuable electronic file issuer's server causes the recipient's terminal to receive the electronic file prepared in f. above via a communication line.
  • Second securities delivery system using valuable electronic files consisting of the following a to g: a. For electronic files of valuable electronic files, at least the file ID and the value and value of the relevant securities (The three are referred to as management data hereinafter), and this management data is also recorded in the management file of the server of the electronic file issuer. b. The system user receives the electronic file of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user causes the recipient to receive the electronic file, and the recipient connects to the server of the issuer of the valuable electronic file through a communication line using a terminal and presents the electronic file.
  • the valuable electronic file issuer verifies the management data recorded in the electronic file and the management data recorded in the management file of the server to verify the valuable electronic issued by the valuable electronic file issuer. Confirm that it is a file.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the server management file, or the server management file.
  • the recorded management data is disabled and new management data is prepared and recorded in the management file.
  • the server of the electronic file issuer prepares an electronic file in which the same management data as the management data recorded in the management file is recorded.
  • the valuable electronic file issuer's server causes the recipient's terminal to receive the electronic file prepared in f. above via a communication line.
  • Third securities delivery system using valuable electronic files consisting of the following a to g: a. For electronic files of valuable electronic files, at least the file ID and the value and value of the relevant securities Data (the three parties are referred to as management data) The data is also recorded in a management file on the server of the electronic file issuer. b. The system user receives the electronic file a. from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user uses a terminal to connect to the server of the issuer of the valuable electronic file via a communication line, designates the recipient, and presents the electronic file.
  • the valuable electronic file issuer verifies the management data recorded in the electronic file and the management data recorded in the management file of the server to verify the valuable electronic issued by the valuable electronic file issuer. Confirm that it is a file.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the server management file, or the server management file.
  • the recorded management data is disabled and new management data is prepared.
  • new management data different from the rewritten or prepared management data is prepared, and two management data are prepared, and the value of the securities in the two management data is determined.
  • the total is recorded in the management file below the value of securities in the management data of the presented valuable electronic file.
  • the server of the valuable electronic file issuer prepares two electronic files in which the same management data as the two management data recorded in the management file is recorded.
  • the server of the above-mentioned valuable electronic file issuer causes the designated recipient's terminal to receive one of the two electronic files prepared in the above f. To the recipient's terminal.
  • the fourth securities delivery system using the following valuable electronic files consisting of a to g: a.
  • the electronic file of the valuable electronic file contains at least the file ID, the value of the relevant securities and the data for verification ( These data are also recorded in the management file on the server of the electronic file issuer.
  • b. The system user receives the electronic file of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user uses a terminal to connect to the server of the issuer of the valuable electronic file via a communication line and present the electronic file.
  • the valuable electronic file issuer verifies the management data recorded in the electronic file and the management data recorded in the management file of the server to verify the valuable electronic issued by the valuable electronic file issuer. Confirm that it is a file.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the server management file, or the server management file.
  • the recorded management data is disabled and new management data is prepared.
  • new management data different from the rewritten or prepared management data is prepared, and two management data are prepared, and the value of the securities in the two management data is determined.
  • the total is recorded in the management file below the value of securities in the electronic file management data presented above.
  • the server of the valuable electronic file issuer prepares two electronic files in which the same management data as the two management data recorded in the management file is recorded.
  • the server of the valuable electronic file issuer causes the user terminal to receive the two prepared electronic files via the communication line.
  • the electronic file of the valuable electronic file contains at least the file ID, the value of the relevant securities and the data for verification ( These data are also recorded in the management file on the server of the electronic file issuer.
  • the system user receives the multiple electronic files of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user connects to the server of the issuer of the valuable electronic file through a communication line using a terminal and presents the plurality of electronic files.
  • the valuable electronic file issuer compares the management data recorded in the plurality of electronic files with the plurality of management data recorded in the management file of the server, respectively. E. If it is confirmed in d.
  • the server is one of the plurality of management data recorded in the management file of the server. Verification data in the management data Rewrite and record data, use the remaining management data recorded in the server management file, or use all of the management data recorded in the server management file. Disable and prepare new management data. Further, the value of securities in the rewritten or prepared management data is set to a value equal to or less than the sum of the values of securities of the plurality of management data recorded in the management finale. Record to file.
  • the server of the valuable electronic file issuer prepares an electronic file in which the same management data as the rewritten or newly prepared management data recorded in the management file is recorded.
  • the server of the valuable electronic file issuer causes the user terminal to receive the prepared electronic file via a communication line.
  • Sixth securities delivery system with valuable electronic files consisting of the following a to e: a. For electronic files of valuable electronic files, at least the file ID and the value and value of the relevant securities (The three are referred to as management data hereinafter), and this management data is also recorded in the management file of the server of the electronic file issuer. b. The system user receives the electronic file of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user uses a terminal to connect to the server of the issuer of the valuable electronic file via a communication line and present the electronic file.
  • the valuable electronic file issuer's server verifies the management data recorded in the electronic file and the management data recorded in the management file to verify the valuable electronic file issued by the valuable electronic file issuer. Make sure that
  • the server disables the management data recorded in the management file, and the value electronic file issuer determines the value of the securities recorded in the management data. Allow users of c. Above to receive their securities.
  • Seventh securities delivery system using valuable electronic files consisting of the following a to g: a. For electronic files of valuable electronic files, at least the file ID and the value and value of the relevant securities Data (the three parties are referred to as management data) The data is also recorded in a management file on the server of the electronic file issuer. b. The system user receives the two electronic files of a. above from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user uses the terminal to connect to the server of the issuer of the valuable electronic file via a communication line and presents the two electronic files.
  • the valuable electronic file issuer matches the management data recorded in the plurality of electronic files with the two management data recorded in the management file of the server, respectively. Confirm that it is a valuable electronic file issued by. e.
  • the server disables all of the management data recorded in the management file of the server, or collation data in part or all of the management data.
  • the management data that is rewritten and recorded but not rewritten is disabled. Unless all the management data is rewritten, new management data is prepared and a total of two management data are prepared. Further, the total value of the securities in the two rewritten or prepared management data is less than or equal to the total value of the securities in the two management data recorded in the management file. And record it in the above management file.
  • the valuable electronic file issuer server prepares two electronic files in which the same management data as the two management data prepared and recorded in the management file is recorded.
  • the server of the valuable electronic file issuer causes the user terminal to receive the two prepared electronic files via the communication line.
  • Eighth securities delivery system based on the following valuable electronic files consisting of a to g: a.
  • the electronic file of the valuable electronic file contains at least the file ID, the value of the relevant securities and the data for verification ( These data are also recorded in the management file on the server of the electronic file issuer.
  • b. Each of the users and recipients of the system receives the electronic file of the above a. from the valuable electronic file issuer or the third party who received the electronic file using the system.
  • the user and recipient use a terminal to connect to the server of the issuer of the valuable electronic file via a communication line and present each electronic file received in b. At that time, the user designates the recipient.
  • the valuable electronic file issuer checks the management data recorded in the electronic file against the management data recorded in the management file of the server, and uses the valuable electronic file issued by the valuable electronic final issuer. Make sure that there is.
  • the server has the ability to rewrite and record the verification data in the management data recorded in the server management file, or the server management file.
  • the recorded management data is disabled and new management data is prepared.
  • the valuable electronic file issuer server prepares two electronic files in which the same management data as the two management data prepared and recorded in the management file is recorded.
  • the valuable electronic file issuer's server causes the user and the recipient's terminal to receive the two prepared electronic files one by one via a communication line.
  • the file ID of management data and the value of securities recorded in the management file of the issuer of the securities file It is also possible to encrypt at least the verification data of the verification data and attach the decryption key to the electronic finale.
  • the server of the issuer of the valuable electronic file makes contact with the recipient of the electronic file.
  • the confirmation data or password is exchanged, and the confirmation data or password is recorded on the issuer's server together with the file ID of the management data.
  • the above recipient uses the terminal to the above issuer's server.
  • the confirmation data or password is presented.
  • the above verification data or password is verified to match the one recorded on the issuer's server. If they also match, it may be confirmed that it is a valuable electronic file issued by the above issuer.
  • the user and the recipient of the valuable electronic file are connected via a communication line using a terminal.
  • a recipient ID is determined between the user and the recipient.
  • the above-mentioned user designates the above-mentioned recipient ID, designates the recipient and presents an electronic file, and the above recipient connects to the issuer's server via a communication line using a terminal, Provide the above recipient ID.
  • the issuer's server may allow the recipient who presented the recipient ID specified by the user to receive the prepared electronic file.
  • the server device receives management data transmitted from a terminal including verification information for determining whether the server device is valid, and the server device receives the management data And the server device determines whether the verification information is valid. If the result of the determination is that the verification information is valid, the server device determines whether the verification information is valid. Information obtained by invalidating information, preparing new valid collation information, and replacing the invalidated collation information included in the management data with the prepared new valid collation information. A data transmission / reception method is provided, wherein the management data is transmitted to the terminal or a terminal different from the terminal.
  • the server device has a memory unit that stores valid verification information, and the verification information included in the received management data is the memory.
  • a data transmission / reception method is provided in which whether or not the verification information is valid is determined by determining whether or not the information is stored in the storage unit.
  • the server device when the server device prepares new effective verification information, the server device generates an encryption key and uses the encryption key to generate the new effective verification information.
  • a data transmission / reception method for transmitting the generated encryption key when the information is encrypted and stored in a memory unit and the replacement management data is transmitted.
  • the verification information is deleted from the memory unit.
  • a data transmission / reception method is provided in which the verification information is invalidated.
  • the memory unit stores invalid collation information in association with attribute information indicating invalidity, and confirms that the collation information is invalid.
  • the data transmission / reception method is characterized in that the verification information is invalidated by being stored in association with the attribute information shown.
  • the management data received by the server device includes management data identification information, and the memory unit encrypts the verification information, and And the server device also receives a decryption key upon receipt of the management data, and is associated with the received management data identifier in the memory unit.
  • the encrypted verification information stored in the management information is read out, the encrypted verification information is decrypted using the received decryption key, and the verification information included in the received management information
  • a data transmission / reception method is provided to determine whether or not is valid.
  • the management data transmitted from the terminal is received together with identification information of a terminal that is a transmission destination of the replaced management data.
  • a data transmission / reception method is provided.
  • the management data transmitted from the terminal is management data transmitted from a terminal different from the terminal to the terminal.
  • a transmission / reception method is provided.
  • the management data is associated with a value that can be divided, and if the verification information is valid according to the determination, the management data is associated with the management data.
  • Data transmission / reception characterized by dividing values, generating new management data, associating one of the divided values with the new management data, and associating the other of the divided values with replaced management data A method is provided.
  • the management data is associated with a value
  • the server device receives a plurality of management data, and each of the plurality of management data is determined based on the determination. If the verification information is valid, a change that reduces the value associated with some of the management data of the plurality of management data and a change that increases the value associated with other management data And a sum of the values after the change does not exceed the sum of the values before the change.
  • a data transmission / reception method in which the server device discards management data associated with a value equal to or lower than a predetermined value as a result of reducing the value.
  • the server device receives a password together with the management information, determines whether the password is valid, and is valid. For example, a data transmission / reception method is provided that determines whether the verification information is valid.
  • the replaced management data is associated with an ID of a recipient, and the server device has the recipient's ID. 13. The data transmission / reception method according to claim 1, wherein the replaced management data is accumulated until a terminal occupied by a recipient indicated by an ID is connected to the server device.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un procédé de transmission/réception de données qui se caractérise comme suit : Un serveur reçoit des données de gestion qui comprennent des informations permettant de déterminer l'efficacité et qui sont transmises à partir d'un terminal. Le serveur détermine si oui ou non les informations de correspondance incluses dans les données de gestion reçus sont efficaces. Si le résultat déterminé indique que les informations de correspondance sont efficaces, le serveur annule la validité des informations de correspondance, prépare de nouvelles informations de correspondance efficaces, et transmet les données de gestion remplacées acquises au terminal ou à un terminal différent du terminal, en remplaçant les informations de correspondance dont la validité a été annulée incluses dans les données de gestion par les nouvelles informations de correspondance préparées.
PCT/JP2007/067943 2006-09-15 2007-09-14 Procédé de transmission/réception de données WO2008032821A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP07807347A EP2075750A1 (fr) 2006-09-15 2007-09-14 Procédé de transmission/réception de données
JP2008534407A JPWO2008032821A1 (ja) 2006-09-15 2007-09-14 データ送受信方法
US12/371,462 US20090182876A1 (en) 2006-09-15 2009-02-13 Data transmitting/receiving method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006251932 2006-09-15
JP2006-251932 2006-09-15

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/371,462 Continuation-In-Part US20090182876A1 (en) 2006-09-15 2009-02-13 Data transmitting/receiving method

Publications (1)

Publication Number Publication Date
WO2008032821A1 true WO2008032821A1 (fr) 2008-03-20

Family

ID=39183873

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2007/067943 WO2008032821A1 (fr) 2006-09-15 2007-09-14 Procédé de transmission/réception de données

Country Status (6)

Country Link
US (1) US20090182876A1 (fr)
EP (1) EP2075750A1 (fr)
JP (1) JPWO2008032821A1 (fr)
KR (1) KR20090058500A (fr)
CN (1) CN101496045A (fr)
WO (1) WO2008032821A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017073102A (ja) * 2015-10-08 2017-04-13 ソンフン キム 仮想通貨を用いる実時間予測基盤の金融取引システム

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9292547B1 (en) * 2010-01-26 2016-03-22 Hewlett Packard Enterprise Development Lp Computer data archive operations
US9178862B1 (en) * 2012-11-16 2015-11-03 Isaac S. Daniel System and method for convenient and secure electronic postmarking using an electronic postmarking terminal
JP2014121034A (ja) * 2012-12-19 2014-06-30 Konica Minolta Inc 端末装置、メール送信システム、および制御プログラム
CN106030668A (zh) * 2013-12-02 2016-10-12 身份认证管理公司 用于多密钥的真正的生物识别身份认证的方法和系统
JP6317974B2 (ja) * 2014-03-28 2018-04-25 アズビル株式会社 データ収集システム

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002259866A (ja) * 2001-02-27 2002-09-13 Nec Commun Syst Ltd 携帯端末接続型カードリーダ装置及びそれを用いた認証決済方法
JP2003346063A (ja) * 2002-05-28 2003-12-05 Canon Inc 情報処理装置
JP2004094716A (ja) * 2002-09-02 2004-03-25 Apuriko System:Kk 電子有価券による有価物受け渡しシステム
JP2004185361A (ja) * 2002-12-04 2004-07-02 Tokyo Electric Power Co Inc:The 電子マネー流通方法
JP2004258969A (ja) * 2003-02-26 2004-09-16 Fujitsu Ltd 仮想通貨管理システム及び方法

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0790588A1 (fr) * 1996-02-12 1997-08-20 Koninklijke KPN N.V. Méthode pour stocker et récupérer en sécurité des données monétaires
DE69721127T2 (de) * 1996-05-31 2003-10-30 Hitachi Ltd Vorrichtung zum Speichern von elektronischem Geld und Chipkartenkontrollverfahren
IL120585A0 (en) * 1997-04-01 1997-08-14 Teicher Mordechai Countable electronic monetary system and method
US6148310A (en) * 1998-08-25 2000-11-14 International Business Machines Corporation Method for combining card marking with remembered sets for old area of a memory heap
DE60029455T2 (de) * 1999-08-26 2007-07-19 Moneycat Ltd. Elektronisches geld, zugehörige elektronische börse und diese anwendende elektronische bezahlungssysteme
US7469233B2 (en) * 2000-07-24 2008-12-23 American Express Travel Related Services Company, Inc. Method and system for facilitating the anonymous purchase of goods and services from an e-commerce website
US8209753B2 (en) * 2001-06-15 2012-06-26 Activcard, Inc. Universal secure messaging for remote security tokens
US8868467B2 (en) * 2002-10-23 2014-10-21 Oleg Serebrennikov Method for performing transactional communication using a universal transaction account identifier assigned to a customer
JP2003141430A (ja) * 2001-11-03 2003-05-16 Apuriko System:Kk 電子ファイルマネー決済システム
US7181732B2 (en) * 2001-11-14 2007-02-20 Sun Microsystems, Inc. Method and apparatus for facilitating lazy type tagging for compiled activations
US7805376B2 (en) * 2002-06-14 2010-09-28 American Express Travel Related Services Company, Inc. Methods and apparatus for facilitating a transaction
US20060034456A1 (en) * 2002-02-01 2006-02-16 Secure Choice Llc Method and system for performing perfectly secure key exchange and authenticated messaging
US7149806B2 (en) * 2002-02-27 2006-12-12 Hewlett-Packard Development Company, L.P. Data access in a distributed environment
JP2004178141A (ja) * 2002-11-26 2004-06-24 Hitachi Ltd 不正使用防止機能付きicカード
JP2006155045A (ja) * 2004-11-26 2006-06-15 Sony Corp 電子価値情報伝送システム及び電子価値情報伝送方法
US7660581B2 (en) * 2005-09-14 2010-02-09 Jumptap, Inc. Managing sponsored content based on usage history
US7631024B2 (en) * 2006-01-03 2009-12-08 Sun Microsystems, Inc. Method and apparatus for facilitating mark-sweep garbage collection with reference counting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002259866A (ja) * 2001-02-27 2002-09-13 Nec Commun Syst Ltd 携帯端末接続型カードリーダ装置及びそれを用いた認証決済方法
JP2003346063A (ja) * 2002-05-28 2003-12-05 Canon Inc 情報処理装置
JP2004094716A (ja) * 2002-09-02 2004-03-25 Apuriko System:Kk 電子有価券による有価物受け渡しシステム
JP2004185361A (ja) * 2002-12-04 2004-07-02 Tokyo Electric Power Co Inc:The 電子マネー流通方法
JP2004258969A (ja) * 2003-02-26 2004-09-16 Fujitsu Ltd 仮想通貨管理システム及び方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PETER WAYNE: "Digital Cash Technology", SOFTBANK CREATIVE, 1997

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017073102A (ja) * 2015-10-08 2017-04-13 ソンフン キム 仮想通貨を用いる実時間予測基盤の金融取引システム

Also Published As

Publication number Publication date
US20090182876A1 (en) 2009-07-16
KR20090058500A (ko) 2009-06-09
JPWO2008032821A1 (ja) 2010-01-28
EP2075750A1 (fr) 2009-07-01
CN101496045A (zh) 2009-07-29

Similar Documents

Publication Publication Date Title
US5850442A (en) Secure world wide electronic commerce over an open network
JP5721086B2 (ja) 電子マネーの管理方法
US7184986B2 (en) Content transaction system and method, and program providing medium therefor
CA2355785C (fr) Presentation electronique de factures faisant appel a un depot de documents fiable
EP1130528B1 (fr) Systeme de secours pour information electronique
US20010044786A1 (en) Content usage management system and method, and program providing medium therefor
US20010007983A1 (en) Method and system for transaction of electronic money with a mobile communication unit as an electronic wallet
KR20180117124A (ko) 블록체인에서 개체의 효율적인 전송을 위한 방법 및 시스템
US20080148069A1 (en) Transferring electronic content
US20040070566A1 (en) Card present network transactions
JPH11513509A (ja) 安全取引のための方法、装置、システムおよびファームウェア
WO2002039342A1 (fr) Systeme de banque de valeurs electroniques privees
JP2002512711A (ja) 携帯可能な身分証明要素でのトランザクション方法
WO2008032821A1 (fr) Procédé de transmission/réception de données
KR20000069703A (ko) 칩카드 및 이것의 사용을 위한 방법
WO2003036537A1 (fr) Systeme de distribution d'informations electroniques
JP3659090B2 (ja) 電子情報流通システム及び電子情報流通プログラムを格納した記憶媒体及び電子情報流通方法
JP4942240B2 (ja) クレジットカードを用いた決済処理方法
JP2009076101A (ja) オンライン取引システム
JP2007310562A (ja) 電子マネーを使用した決済方法
JP4903346B2 (ja) 擬似或いは代理口座番号なしでコンピュータネットワークを越えて安全な支払いを処理するための改善された方法およびシステム
JP4942245B2 (ja) クレジットカードを用いた決済処理方法
KR20020058325A (ko) 전자영수증 발급 방법
JP2002312707A (ja) クレジットカードを用いた決済処理方法
JP4197911B2 (ja) 電子有価券受け渡しシステム

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780028682.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07807347

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2008534407

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 1020097001762

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007807347

Country of ref document: EP